Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smartphones

RSS Feed    Add to Google    Add to My Yahoo!
Smartphones Reports
 
Remote access to Windows apps
sponsored by Citrix
ESSENTIAL GUIDE: This guide outlines a comprehensive technology that delivers Windows-based applications to both remote users using different types of endpoints and physical workspaces. Explore the five-layer solution architecture and how each of these layers work together to provide a secure environment for delivering applications.
Posted: 17 Apr 2015 | Published: 31 Jul 2014

Citrix

Mobilize Your Windows Apps
sponsored by Citrix
WHITE PAPER: This white paper discusses the concept of application virtualization and demonstrates how application virtualization can enhance mobile app management.
Posted: 16 Apr 2015 | Published: 31 Dec 2014

Citrix

Mobile Load Testing Challenges
sponsored by Neotys
WHITE PAPER: This white paper elaborates on the challenges of mobile load testing and gives suggestions for overcoming those challenges.
Posted: 29 Apr 2015 | Published: 31 Dec 2014

Neotys

Bringing Innovative Mobile Applications to the Financial Services Industry
sponsored by Carrington Associates
WHITE PAPER: This white paper details how one electronic payment company was able to successfully develop a mobile platform to streamline business. Read on to learn how you can stay ahead of the competition by bring secure, reliable mobile applications to customers – faster.
Posted: 02 Jul 2015 | Published: 30 Sep 2014

Carrington Associates

Best Practices for Building a Mobility Strategy
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn how you can create a mobile strategy that enables a productive workforce without harming security or control.
Posted: 17 Jul 2015 | Published: 30 May 2014

Cisco Systems, Inc.

Managing Security Threats in Today's Mobile Enterprise
sponsored by BlackBerry
WEBCAST: This video tackles the issue of mobile security and discusses how, despite the multitude of threats facing mobile devices, you can make sure your enterprise remains secure.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

BlackBerry

IT Survival Guide: Tales of the Unbelievable
sponsored by Lenovo and Microsoft
EGUIDE: Download and discover a humorous way to look at mobile productivity, security, reliability, durability and how to equip your end users with proven performance on the go.
Posted: 30 Jun 2015 | Published: 30 Jun 2015

Lenovo and Microsoft

Securing the mobile workspace
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about a technology that adds a key layer of security and control to let you deliver a complete mobile workspace on any device. Find out how this ensures that all devices – corporate-owned or BYOD – are compliant before they access the enterprise network.
Posted: 03 Aug 2015 | Published: 31 Jan 2014

Citrix

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: This white paper explores how to use device security telemetry to form a digital firmware fingerprint on each device to identify when one is vulnerable or has been compromised through jailbreak.
Posted: 22 Jul 2015 | Published: 24 Jun 2015

Lookout

Secure application delivery for a mobile workforce
sponsored by Citrix
WHITE PAPER: Access this white paper to discover two technologies that provide a complete, end-to-end-mobility solution by managing both application types. Find out how one makes it simple to mobilize Windows applications for use on any mobile device and how the other manages, secures and deploys native mobile apps.
Posted: 03 Aug 2015 | Published: 28 Feb 2014

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement